EHA
Crowdsourced Threat Intelligence

What is Crowdsourced Threat Intelligence?

Threat intelligence is essential for cybersecurity, as it provides organizations with a clear view of the current threat landscape and enables them to adapt their defenses accordingly. While there are many ways to gather...
New Editbot Stealer in Action; Stealing Browser Passwords & Cookies

New Editbot Stealer in Action; Stealing Browser Passwords & Cookies

A new malicious campaign, Editbot Stealer, was discovered in which threat actors use WinRAR archive files with minimal detection to perform a multi-stage attack. Threat actors have been utilizing the theme of "defective product...
Threat Actors Actively Exploiting Cisco IOS XE Zero-day Vulnerability

Threat Actors Actively Exploiting Cisco IOS XE Zero-day Vulnerability

Threat actors exploit zero-day vulnerabilities because these flaws are unknown to the software developers, making them highly effective for launching attacks.  Exploiting zero-days allows malicious actors to bypass security measures and gain unauthorized access or...
EtherHiding: A Novel Technique to Hide Malicious Code Using Binance’s Smart Chain

EtherHiding: A Novel Technique to Hide Malicious Code Using Binance’s Smart Chain

Threat actors have employed a new technique to distribute malicious code named “EtherHiding,” which abuses Binance's Smart Chain (BSC) contracts to host parts of a malicious code chain to hide them inside the blockchain. To...
Telegram, AWS, and Alibaba Cloud Users Targeted in latest supply chain attack

Telegram, AWS, and Alibaba Cloud Users Targeted in Latest Supply Chain Attack

A new supply-chain attack, which was active throughout September 2023, has been discovered in which threat actors used Typosquatting and Startjacking techniques to lure developers using Alibaba cloud services, AWS, and Telegram into downloading...
Webwyrm Malware Attacking Over 100,000 Users Across 50 Countries

Webwyrm Malware Affects More Than 100,000 Users in 50 Countries

Threat actors are evolving their Tactics, Techniques, and Procedures (TTPs) at an alarming rate.  With technological advancements and increased awareness of cybersecurity measures, they continually adapt to exploit vulnerabilities and enhance their attack success rates. Webwyrm,...
Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to cyberattacks through cleverly crafted campaigns. In a recent campaign, Chinese users were lured with a...
Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User

Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User

Cisco was reported with a critical vulnerability that could allow threat actors to log in to the affected devices as a root account. The CVE for this vulnerability has been given as CVE-2023-20101 and...
Notepad++ Input Validation Flaws Leads to uncontrolled Search Path Vulnerability

Notepad++ Input Validation Flaws Leads to uncontrolled Search Path Vulnerability

Notepad++ has been discovered with an uncontrolled search path vulnerability, which could allow threat actors to search an untrusted search path. This vulnerability has been disclosed to Notepad++, and a patch has yet to...
New Ransomware Trend – Threat Actors Deploy Two Ransomware on Victims’ Networks

New Ransomware Trend – Threat Actors Deploy Two Ransomware on Victims’ Networks

The FBI alerts on rising ransomware trends and urges organizations to follow mitigation recommendations for minimizing ransomware risks and consequences. In July 2023, the FBI observed two ransomware trends, and here we have mentioned them:- Multiple...

Managed WAF

Website

Latest News